Sorry, your browser is not supported
To have the best experience using Skillshare, we recommend that you use one of these supported browsers.

Learn Man In The Middle Attacks From Scratch

Saad Sarraj, Ethical Hacker, IT Expert

Play Speed
  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x
34 Videos (2h 43m)
    • Introduction

      1:01
    • Installing Kali Linux 2.0 as ISO file

      6:10
    • Installing kali linux as a virtual machine (VirtualBox)

      4:52
    • Installing Kali Linux 2.0 as a Virtual Machine (VMware)

      2:37
    • Installing Kali Linux 2.0 as a Virtual Machine (VMware)

      2:28
    • Setup Windows as a Virtual Machine

      2:52
    • Updating Kali LInux 2.0

      1:35
    • Network Basic explain

      2:36
    • What is the Mac address ? and how you can change it ?

      5:23
    • Man in the middle attack introduction

      1:12
    • Man in the middle attack explain

      3:40
    • Gathering information about the connected clients

      2:59
    • Gather detailed information about the clients(zenmap)

      7:10
    • MITM attack using (arpspoof)

      6:36
    • Capturing login credentials

      5:23
    • Bypassing SSL certificate

      6:38
    • Redirect any client from to any website (DNS spoofing)

      6:32
    • Stealing the Cookies (Session Hijacking)

      7:02
    • Capture a screenshot from the target browser

      4:12
    • Injecting a keylogger into the webpage

      4:49
    • Capturing images from the network traffic

      3:35
    • Injecting html file and flip the images in the target browser

      6:48
    • Injecting JavaScript URL and Hooking the client’s with BeEF

      6:58
    • Stealing the target accounts with BeEF

      3:45
    • Having fun with BeEF

      8:49
    • Creating an encrypted Backdoor

      4:47
    • Testing the Backdoor in the target device

      4:29
    • Creating a Fake browser Update and Hack any client

      4:49
    • Interacting with the Target Computer (Part 1)

      6:29
    • Interacting with the Target Computer (Part 2))

      6:11
    • Detect ARP Poisoning attack using (XARP)

      3:21
    • Detect ARP Poisoning attack (Wireshark)

      5:34
    • Prevent your ARP table from poisoning

      5:51
    • Detect and Kill any Meterpreter Session

      6:14

About This Class

in this course, you will start as a beginner without any previous knowledge about the hacking, this course focuses on the practical side more than the theoretical side.

 In this course you will learn how to set up your Kali Linux Environment properly and it's going to be Kali Linux 2.0
which is the newest version of offensive security Organization, then you will learn how the Devices communicate with each other then you will go through the theory behind man in the middle attacks because this will help you to understand what's going on, then we will learn the theory behind ARP poisoning and how to perform it.

This course is divided to four parts:

  1. Preparation: In this section, you will learn how to download and setup Kali Linux 2.0 properly as a virtual machine, and how you can update it, this will help you to create your safe Environment to do Penetration Testing .
  2. Network Basics: here you will learn the basics of networks that will help you to understand what you should do before network security testing.
  3. MITM Attack: this section which is the gravest and the funniest section in this course because its includes a lot of funny things that you can do such as (playing music in the target computer, stealing the passwords, etc....) and even fully control the connected device.
  4. Protecting yourself against these attacks: after learning these attacks now it's time to learn how to protect yourself and your accounts against all previous attacks.

Notes: 

  • tThese Attacks are working on any device such as (Tablets Laptops and Smartphones etc....)  and on any operating system, such as (IOS, Android, Windows, Linux, OSX, etc....).
  •  You must practice what you learned to become an advanced level, because this course is focuses on practical side. 
  • This course is going to be always up to date.
  • This course is only for ethical purposes.
  • If you have any question or any problem, you can send a message to us or comment.
  • After finishing this course, you will get a certificate from Udemy.
  • All the people who enrolled in this course will get discounts for future courses.
  • All the Rights are Reserved to iSecurityPro no other Organization is involved.

Who is the target audience?

  • This course is for the people who want to do a Penetration Testing against their devices
  • for the people who wants secure their devices against these attacks
  • For the people who wants to protect themselfs and there accounts against all of these attacks.

8

Students

--

Projects

0

Reviews (0)

Saad Sarraj

Ethical Hacker, IT Expert

My Name is Saad Sarraj , i am a young Ethical Hacker who is trying to keep the things secure.I have a very good Experience in penetration testing and Ethical Hacking, i started in this field since 2012 , then i have created my own website (iSecurityPro) and started making videos on my YouTube channel which includes many tips and tricks about Linux OS and Windows OS , i am always focusing on the practical side in producing videos and also the theory behind every single attack , and i am tryin...

See full profile